1. Ryoan: a distributed sandbox for untrusted computation on secret data;Hunt;EuroGP,2020
2. Connor RJ, McDaniel T, Smith JM, et al. Pitfalls: Attacks on PKU-based memory isolation systems. Proceedings of the 29th USENIX security symposium; 2020 Aug 12-14; Berkeley: USENIX; 2020.p. 1409-26.
3. Watson RN, Anderson J, Laurie B, et al. Capsicum: Practical capabilities for UNIX. Proceedings of the 19th USENIX security symposium; 2010 Aug 11-13; Washington, USA. Berkeley: USENIX; 2010. p. 3.
4. Narayan S, Disselkoen C, Garfinkel T, et al. Retrofitting fine grain isolation in the firefox renderer. Proceedings of the 29th USENIX security symposium; 2020 Aug 12-14. Berkeley: USENIX; 2020. p. 699-716.
5. Grossschadl J, Vejda T and Page D. Reassessing the TCG specifications for trusted computing in mobile and embedded systems. Proceedings of 2008 IEEE international workshop on hardware-oriented security and trust; Anaheim, USA. Piscataway: IEEE; 2008.p. 84-90.